aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorng0 <ng0@infotropique.org>2017-10-28 18:15:24 +0000
committerng0 <ng0@infotropique.org>2017-10-28 18:15:24 +0000
commitdb1c7a0dd711d032bf874f6f6bf13e80aa2a07d1 (patch)
tree4c4f9aa2f8fde71d61f61c7b3a4745182cd4cacc /doc
parent6e91a3e11b01a9ab551915d50736d45bf2b54f8c (diff)
downloadgnunet-db1c7a0dd711d032bf874f6f6bf13e80aa2a07d1.tar.gz
gnunet-db1c7a0dd711d032bf874f6f6bf13e80aa2a07d1.zip
+
Diffstat (limited to 'doc')
-rw-r--r--doc/documentation/README.txt8
-rw-r--r--doc/documentation/chapters/philosophy.texi29
2 files changed, 28 insertions, 9 deletions
diff --git a/doc/documentation/README.txt b/doc/documentation/README.txt
index 28223f009..c5915d6a4 100644
--- a/doc/documentation/README.txt
+++ b/doc/documentation/README.txt
@@ -13,6 +13,14 @@ To be moved to an appropriate section of "how to write documentation" or
133. Do not use tab characters (see chapter 2.1 texinfo manual) 133. Do not use tab characters (see chapter 2.1 texinfo manual)
14 14
154. Use neutral language and third person perspective in the text 154. Use neutral language and third person perspective in the text
16
175. Use 2 spaces between sentences, so instead of:
18
19 We do this and the other thing. This is done by foo.
20
21 Write:
22
23 We do this and the other thing. This is done by foo.
16* What's left to do 24* What's left to do
17 25
18- Which Texlive modules are needed? Decrease the size. 26- Which Texlive modules are needed? Decrease the size.
diff --git a/doc/documentation/chapters/philosophy.texi b/doc/documentation/chapters/philosophy.texi
index 01d13254a..0f948fcab 100644
--- a/doc/documentation/chapters/philosophy.texi
+++ b/doc/documentation/chapters/philosophy.texi
@@ -181,8 +181,12 @@ and each of these can have a different addresses.
181Binding messages expire after at most a week (the timeout can be 181Binding messages expire after at most a week (the timeout can be
182shorter if the user configures the node appropriately). 182shorter if the user configures the node appropriately).
183This expiration ensures that the network will eventually get rid of 183This expiration ensures that the network will eventually get rid of
184outdated advertisements.@footnote{More details can be found in 184outdated advertisements.
185@uref{https://gnunet.org/transports, A Transport Layer Abstraction for Peer-to-Peer Networks}} 185@footnote{Ronaldo A. Ferreira, Christian Grothoff, and Paul Ruth.
186A Transport Layer Abstraction for Peer-to-Peer Networks
187Proceedings of the 3rd International Symposium on Cluster Computing
188and the Grid (GRID 2003), 2003.
189(@uref{https://gnunet.org/git/bibliography.git/plain/docs/transport.pdf, pdf})}
186 190
187@cindex Accounting to Encourage Resource Sharing 191@cindex Accounting to Encourage Resource Sharing
188@node Accounting to Encourage Resource Sharing 192@node Accounting to Encourage Resource Sharing
@@ -249,15 +253,18 @@ Providing anonymity for users is the central goal for the anonymous
249file-sharing application. Many other design decisions follow in the 253file-sharing application. Many other design decisions follow in the
250footsteps of this requirement. 254footsteps of this requirement.
251Anonymity is never absolute. While there are various 255Anonymity is never absolute. While there are various
252@uref{https://gnunet.org/anonymity_metric, scientific metrics} that can 256scientific metrics@footnote{Claudia Dı́az, Stefaan Seys, Joris Claessens,
253help quantify the level of anonymity that a given mechanism provides, 257and Bart Preneel. Towards measuring anonymity.
254there is no such thing as complete anonymity. 2582002.
259(@uref{https://gnunet.org/git/bibliography.git/plain/docs/article-89.pdf, pdf})}
260that can help quantify the level of anonymity that a given mechanism
261provides, there is no such thing as complete anonymity.
255GNUnet's file-sharing implementation allows users to select for each 262GNUnet's file-sharing implementation allows users to select for each
256operation (publish, search, download) the desired level of anonymity. 263operation (publish, search, download) the desired level of anonymity.
257The metric used is the amount of cover traffic available to hide the 264The metric used is the amount of cover traffic available to hide the
258request. 265request.
259While this metric is not as good as, for example, the theoretical metric 266While this metric is not as good as, for example, the theoretical metric
260given in @uref{https://gnunet.org/anonymity_metric, scientific metrics}, 267given in scientific metrics@footnote{likewise},
261it is probably the best metric available to a peer with a purely local 268it is probably the best metric available to a peer with a purely local
262view of the world that does not rely on unreliable external information. 269view of the world that does not rely on unreliable external information.
263The default anonymity level is 1, which uses anonymous routing but 270The default anonymity level is 1, which uses anonymous routing but
@@ -331,8 +338,12 @@ encryption as the link-encryption between the nodes. GNUnet has
331encryption on the network layer (link encryption, confidentiality, 338encryption on the network layer (link encryption, confidentiality,
332authentication) and again on the application layer (provided 339authentication) and again on the application layer (provided
333by @command{gnunet-publish}, @command{gnunet-download}, 340by @command{gnunet-publish}, @command{gnunet-download},
334@command{gnunet-search} and @command{gnunet-gtk}).@footnote{More details 341@command{gnunet-search} and @command{gnunet-gtk}).
335can be found @uref{https://gnunet.org/encoding, here}} 342@footnote{Christian Grothoff, Krista Grothoff, Tzvetan Horozov,
343and Jussi T. Lindgren.
344An Encoding for Censorship-Resistant Sharing.
3452009.
346(@uref{https://gnunet.org/git/bibliography.git/plain/docs/ecrs.pdf, pdf})}
336 347
337@cindex Peer Identities 348@cindex Peer Identities
338@node Peer Identities 349@node Peer Identities
@@ -380,7 +391,7 @@ public key first.
380@subsection Egos 391@subsection Egos
381 392
382Egos are your "identities" in GNUnet. Any user can assume multiple 393Egos are your "identities" in GNUnet. Any user can assume multiple
383identities, for example to separate teir activities online. Egos can 394identities, for example to separate their activities online. Egos can
384correspond to pseudonyms or real-world identities. Technically, an 395correspond to pseudonyms or real-world identities. Technically, an
385ego is first of all a public-private key pair. 396ego is first of all a public-private key pair.
386 397